It’s W2 time! You know it, I know it, and criminals know it. Every year dozens of human resource professionals fall victim to phishing schemes. Criminals target HR departments posing as C-level leadership, often with spoofed email addresses that look very similar to the correct email address, requesting a copy of the W2s for all employees. Eager to comply – and possibly flattered by the[...]
4 Online Scanning Methods That Won’t Take Your Plants Down It’s hard to believe it’s already been a week since I presented at S4x19 on assessment tools for ICS environments. After a brief introduction weighing the risks posed by traditional online tools versus the risk of doing nothing, I walked through four online scanning techniques that offer low impact, high value results. I know these can[...]
Supercharge your hardware security in IoT devices The IoT marketplace moves fast, and device vendors continuously struggle to balance speed to market with implementing proper security measures. When devices cross over between industrial control systems (ICS) and IoT connectivity (often referred to as Industrial IoT or IIoT) ensuring deployed devices are properly secure becomes paramount to[...]
Although value can be derived from offline methods such as paper-based framework assessments, many critical discoveries can only be uncovered through a technical assessment using online, active assessment techniques.
Prioritize Now for Proactive Defense As 2018 saw more massive data breaches, disruptive attacks, and business email compromise, we look ahead at how organizations should be prioritizing security initiatives to combat the current state of cyber security amidst an ever-evolving threat landscape. Here are five cyber challenges we predict board rooms and security teams will be prioritizing this[...]